Vulnerability Discussion
As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. This is in addition to the anonymous web user account. The resources to which these accounts have access must also be closely monitored and controlled. Only the SA needs access to all the system’s capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files. The anonymous web user account must not have access to system resources as that account could then control the server.
Check
Obtain a list of the user accounts with access to the system, including all local and domain accounts.
Review the privileges to the web server for each account.
Verify with the system administrator or the ISSO that all privileged accounts are mission essential and documented.
Verify with the system administrator or the ISSO that all non-administrator access to shell scripts and operating system functions are mission essential and documented.
If undocumented privileged accounts are found, this is a finding.
If undocumented non-administrator access to shell scripts and operating system functions are found, this is a finding.
If this IIS 10 installation is supporting Microsoft Exchange, and not otherwise hosting any content, this requirement is Not Applicable.
Fix
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.
All non-administrator access to shell scripts and operating system functions must be mission essential and documented.